Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-10-18 11:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Beware the square: how to spot malicious QR codes

QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]

Products & Services Android IPhone QR Codes
2019-10-18 11:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Beware the square: how to spot malicious QR codes

QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]

Products & Services Android IPhone QR Codes
2019-10-18 11:31:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Some Android adware apps hide icons to make it hard to remove them

SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the user’s device.

Android Google Adware Fleeceware Google Play Store Play Store
2019-10-18 11:25:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Bitcoin money trail leads cops to ‘world’s largest’ child abuse site

The Darknet server running the site, "Welcome to Video", and the website's convicted admin were tracked down by a global police force.

Law & Order Bitcoin Child Abuse Child Abuse Imagery Child Porn Child Sexual Abuse DarkNet Jong Woo Son South Korea Welcome To Video
2019-10-18 09:54:00 UTC
Naked Security | Sophos
Naked Security | Sophos
S2 Ep13.5: All about social media: Growing up online, parent advice and social shaming – Naked Security Podcast

A special episode dedicated to social media culture!

Podcast Social Networks Naked Security Podcast Social Media
2019-10-18 09:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Much-attacked Baltimore uses ‘mind-bogglingly’ bad data storage

IT workers have been storing files on their computers' hard drives. One councilman's alleged response: “That can’t be right? That’s real?”

Data Loss Government Security Ransomware Security Threats Backups Baltimore Data Storage Ransomware RobbinHood
2019-10-17 20:17:00 UTC
ThreatPost
ThreatPost
Phorpiex Botnet Shifts Gears From Ransomware to Sextortion

A decade-old botnet is using infected computers to send out sextortion emails, in a wide-scale campaign with the potential to reach millions of victims.

Hacks Web Security Email Email Security GandCrab Phorpiex Ransomware Sextortion Web Security
2019-10-17 19:30:00 UTC
Dark Reading
Dark Reading
Phishing Campaign Targets Stripe Credentials, Financial Data

Attackers make use of an old trick and evade detection by blocking users from viewing an embedded link when hovering over the URL.

2019-10-17 19:00:00 UTC
Dark Reading
Dark Reading
State of SMB Insecurity by the Numbers

SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different picture.

2019-10-17 18:00:00 UTC
Dark Reading
Dark Reading
Smart Prevention: How Every Enterprise Can Create Human Firewalls

Organizations of all sizes should include both human firewalls and virtual tools in their cybersecurity budgets.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES